Managing access remotely

July 2013 Access Control & Identity Management

High walls, electric fencing and state-of-the-art alarm and CCTV systems have become an integral part of South African life in the face of the country’s unprecedented crime level. To counter the rapid advancement of security technology, criminal syndicates are continually advancing and refining their modus operandi as evidenced by their well-planned, well-researched attacks. Yet residents who barricade themselves into their properties could cut off vital access from their armed response companies in an emergency.

“Crime control today is not only about installing various physical security measures if armed response security personnel are unable to enter the premises to investigate the cause of an alarm which is a critical elements of protection. It is not much use for them to respond to an alarm in an instant, only for them to be unable to get on to the property.”

Similarly, homeowners that wish to grant access to the property for the garden services or pool repairs, need not leave work to cater for these suppliers. This is according to Ingo Mutinelli, national sales manager for Elvey Security Technologies.

The Gatekeeper empowers the user to be in control of who enters the premises and when. Fundamentally a cellphone inner, says Mutinelli, redesigned in order to snugly fit inside a small box that you can connect to a gate motor or any other appliance that requires remote control. The device has two relay switches that, when activated, change from a normally open state, to a closed state. All that is required to activate the Gatekeeper is to simply dial into the unit, which will trigger the opening mechanism.”

He adds: “When you purchase a Gatekeeper, entering the product code for the first time allows you to register the unit as well as create a profile, user name and password. Thereafter, homeowners can program in details of their security company, family friends and other service providers. Schedules can be created for domestic staff and servicing companies to come and go during allotted working hours, or access on or off the property can be done through a simple missed call to the unit. Equipped with a pay-as-you-go SIM card, all you have to do is top it up when necessary.”

What is more, owners can dial their gate from any phone, the missed call triggers one of two potential outputs, opening either the pedestrian or main gate, provided the unit recognises the identity of the incoming caller.

For more information contact Elvey Security Technologies, +27 (0)11 401 6700, priyesh.jagjivan@elvey.co.za, www.elvey.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Banking’s AI reckoning
Commercial (Industry) Surveillance Access Control & Identity Management Fire & Safety Perimeter Security, Alarms & Intruder Detection Information Security Asset Management News & Events Integrated Solutions Infrastructure Security Services & Risk Management Education (Industry) Entertainment and Hospitality (Industry) Financial (Industry) Healthcare (Industry) Industrial (Industry) Mining (Industry) Residential Estate (Industry) Retail (Industry) Transport (Industry) Conferences & Events Products & Solutions Associations Videos Training & Education Smart Home Automation Agriculture (Industry) Logistics (Industry) AI & Data Analytics Facilities & Building Management IoT & Automation Power Management
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
Identity-led security in banking
Secutel Technologies Access Control & Identity Management Products & Solutions
Traditional keys, cards, and siloed systems are no longer sufficient in a world where security, compliance, and operational efficiency must work together seamlessly. In 2026, the focus is firmly on smart access.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Who has access to your face?
Access Control & Identity Management AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Who has access to your face?
Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts,

Read more...
Advanced time & attendance solutions
Technews Publishing Access Control & Identity Management Products & Solutions
From biometric devices to a powerful mobile app, you will see how businesses of all sizes save time, cut costs, and improve productivity with BioSyn.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.